Journal Article A Sequent Calculus for Counterfactual Reasoning (CMU-CyLab-17-003) 2017 McCall M, Loh LK, Jia L
Conference Distributed Provenance Compression 2017 • Proceedings / ACM-SIGMOD International Conference on Management of Data. ACM-Sigmod International Conference on Management of Data • 203-218 Chen C, Lehri HT, Loh LK, Alur A, Jia L, Loo BT, Zhou W
Conference Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes 2017 • PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) • 1501-1510 Surbatovich M, Aljuraidan J, Bauer L, Das A, Jia L
Conference Timing-Sensitive Noninterference through Composition 2017 • Lecture Notes in Computer Science • 10204:3-25 Rafnsson W, Jia L, Bauer L
Journal Article Monitors and Blame Assignment for Higher-Order Session Types 2016 • ACM Sigplan Notices • 51(1):582-594 Jia L, Gommerstadt H, Pfenning F
Journal Article Monitors and blame assignment for higher-order session types 2016 • ACM Sigplan Notices • 51(1):582-594 Jia L, Gommerstadt H, Pfenning F
Conference UBERSPARK: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor 2016 • PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM • 87-104 Vasudevan A, Chaki S, Maniatis P, Jia L, Datta A
Conference A Logic of Programs with Interface-confined Code 2015 • Proceedings of the Computer Security Foundations Workshop • 512-525 Jia L, Sen S, Garg D, Datta A
Journal Article A PROGRAM LOGIC FOR VERIFYING SECURE ROUTING PROTOCOLS 2015 • Logical Methods in Computer Science • 11(4): Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Preprint A Program Logic for Verifying Secure Routing Protocols 2015 Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Conference Automated Verification of Safety Properties of Declarative Networking Programs 2015 • PROCEEDINGS OF THE 17TH INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING (PPDP 2015) • 79-90 Chen C, Loh LK, Jia L, Zhou W, Loo BT
Conference Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 1130-1143 Chowdhury O, Garg D, Jia L, Datta A
Preprint Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 Chowdhury O, Garg D, Jia L, Datta A
Journal Article Logic of Programs with Interface-confined Code (CMU-CyLab-13-001) 2015 Jia L, Sen S, Garg D, Datta A
Journal Article Monitors and Blame Assignment for Higher-Order Session Types (CMU-CyLab-15-004) 2015 Jia L, Gommerstadt H, Pfenning F
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015 Clarkson M, Jia L
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015 Clarkson M, Jia L
Conference Run-time Monitoring and Formal Analysis of Information Flows in Chromium 2015 • 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) Bauer L, Cai S, Jia L, Passaro T, Stroucken M, Tian Y
Conference A Program Logic for Verifying Secure Routing Protocols 2014 • Lecture Notes in Computer Science • 8461:117-132 Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Conference Analyzing the Dangers Posed by Chrome Extensions 2014 • 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) • 184-192 Bauer L, Cai S, Jia L, Passaro T, Tian Y
Conference Android taint flow analysis for app sets 2014 • Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) • 1-6 Klieber W, Flynn L, Bhosale A, Jia L, Bauer L
Conference Continuous Tamper-Proof Logging Using TPM 2.0 2014 • Lecture Notes in Computer Science • 8564:19-36 Sinha A, Jia L, England P, Lorch JR
Journal Article Continuous Tamper-proof Logging using TPM2.0 2014 Sinha A, Jia L, England P, Lorch JR
Conference Lightweight source authentication and path validation 2014 • Proceedings of the 2014 ACM conference on SIGCOMM Kim TH-J, Basescu C, Jia L, Lee SB, Hu Y-C, Perrig A
Conference Lightweight Source Authentication and Path Validation 2014 • Computer Communication Review • 271-282 Kim TH-J, Basescu C, Jia L, Lee SB, Hu Y-C, Perrig A